Categories
Life with GDPR

Life With GDPR – Endpoint Security and Data Protection: Uncovering the Hidden Compliance Risks in Printer Security with Jim LaRoe

Jonathan Armstrong remains on assignment. Today, Tom Fox visits with fellow Texan Jim LaRoe, CEO of Symphion, to discuss data privacy, data protection, and compliance related to printer security in one of the most interesting podcasts Tom has done in some time.

Jim provides insight into how 20-30% of network endpoints are printers, and alarmingly, 99% of these are unprotected. Printers, despite being integral to business functions, are typically left vulnerable, making them prime targets for sophisticated phishing and cyber-attacks. Jim shares his journey from a trial lawyer to founding Symphion in 1999 and explains Symphion’s groundbreaking work in developing comprehensive security software for printers. Jim highlights the importance of a culture of compliance in managing endpoint security and the multifaceted challenges that come with securing printers.  He emphasizes the collaborative effort needed among GRC compliance teams, IT, and supply chain departments to manage printer security effectively, and offers actionable steps for businesses to mitigate these risks.

Key takeaways:

  • The Hidden Risk of Printers
  • Understanding Endpoint Security
  • Challenges in Printer Security
  • Risk Management Strategies
  • Supply Chain Vulnerabilities

Resources:

Connect with Tom Fox

Connect with Jim LaRoe

Connect with Symphion

The award-winning Life with GDPR was recently honored as a Top Data Security Podcast. This was a sponsored podcast.

Categories
Life with GDPR

Life With GDPR – From IT to Total Compliance Tracking with Adam Goslin

Jonathan Armstrong remains on assignment. Today, Tom visits with Adam Goslin, founder of Total Compliance Tracking, to discuss his journey from IT development and management to becoming a leader in the security and compliance sector.

Adam shares his professional background, the challenges he faced with achieving PCI compliance, and the insights that led him to create a system to streamline compliance management. He details how his company, TCT, helps organizations efficiently manage various certifications and compliance standards. Adam also discusses the unique, direct marketing approach TCT employs and shares the philosophy behind providing accessible compliance resources. This conversation offers valuable insights into the importance of pragmatic, user-friendly compliance solutions.

Key takeaways:

  • Adam Goslin’s Professional Journey
  • Founding Total Compliance Tracking
  • Marketing Strategy and Philosophy
  • Future of TCT and Industry Insights

Resources:

Connect with Tom Fox

Connect with Adam Goslin

Connect with Total Compliance Tracking

Life with GDPR was recently honored as a Top Data Security Podcast.  

Categories
Innovation in Compliance

Innovation in Compliance – Global Outsourcing and GDPR Compliance – Navigating Challenges and Opportunities with Inge Zwick

Innovation comes in many areas, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, Tom Fox interviews Inge Zwick, a senior leader from Emapta Global, a global outsourcing company, who elaborates on his experience working in different international locations, including the Philippines and now Italy.

Zwick discusses the complexities and common concerns around outsourcing under GDPR, emphasizing the importance of compliance and data protection. They explain how Emapta supports clients in achieving GDPR compliance while outsourcing, including risk assessments, data flow mapping, and maintaining secure work environments. The conversation delves into the practical aspects of handling Subject Access Requests (SARs), the integration of compliance into operational workflows, and the importance of maintaining ongoing monitoring and updates. Zwick also touches upon how ESG initiatives and compliance are seamlessly woven into Emapta’s operations, providing a sustainable approach to global outsourcing. Lastly, advice is given to business leaders on how to future-proof their outsourcing strategies in light of GDPR, encouraging them not to shy away from global talent opportunities due to compliance fears.

Key highlights:

  • Company Overview and Global Operations
  • Outsourcing and GDPR Compliance
  • Risk Assessment and Data Security
  • Subject Access Requests (SAR)
  • Outsourcing Contracts and GDPR Obligations
  • Integrating Compliance into Operations
  • Future-Proofing Your Outsourcing Strategy  

Resources:

Connect with Inge Zwick

Connect with Emapta Global

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Blog

Preparing for the New Data Security Program, Part 1

Yesterday, I introduced the Department of Justice’s (DOJ) new Data Security Program (DSP), which was released on April 8, 2025, and implemented under Executive Order 14117. Today, I want to begin reviewing key actions you can take now to prepare for the full effective date of October 6, 2025. We will complete our review of key steps to take tomorrow.

1. Review your current data governance and privacy policies—align them with DSP risk categories.

Data governance is no longer just about classification and access rights; it’s now a frontline national security function. The DSP requires fundamentally rethinking how organizations define, inventory, and control sensitive data. Compliance officers must start with a forensic review of current data governance frameworks: What data are you collecting? Who touches it? Where does it live? Who can access it, and how is it transferred internally and externally? Once mapped, each dataset must be examined through the DSP lens: Is it government-related? Does it contain bulk sensitive personal data? Is it linked to current or former U.S. government personnel? These are not simply IT questions. These are compliance questions with profound legal implications.

Next, organizations must evaluate their privacy policies for blind spots. Many policies were written for GDPR or CCPA, not for adversarial data exfiltration by foreign intelligence services. If your data policies are not risk-aligned to DSP categories, such as data brokered to third parties or aggregated in ways that make re-identification likely, you are flying blind in a regulatory minefield. This isn’t a call for a quick redline but a strategic overhaul of how you structure data controls, policies, and risk frameworks. Collaborate with your CISO, but lead with your compliance hat on. The DOJ is not asking for IT security alone, and they are demanding accountable, auditable compliance with national security-grade rigor. Treat this like an FCPA compliance program: document everything, know your risk vectors, and escalate anomalies. The age of “data policy as an afterthought” is over. In the DSP era, data is not just a privacy concern but a geopolitical flashpoint.

2. Audit your third-party vendor agreements for exposure to covered persons or countries of concern.

Third-party risk just got geopolitical. Under the DSP, vendor due diligence has become a national security obligation. You must now screen for performance and financial viability and whether any foreign vendor, subcontractor, or partner is a “covered person” or tied to a country of concern like China, Russia, Iran, North Korea, Venezuela, or Cuba. Even indirect ownership or residency triggers a compliance obligation. That friendly cloud storage provider with a branch in Shenzhen? Is that IT support firm subcontracting code maintenance to Belarus? They may now be regulatory liabilities under the DSP.

Start with a comprehensive audit of all current vendor agreements, focusing on data-sharing terms, sub-licensing permissions, and geographic exposure. Can the vendor access, process, or host government-related or bulk-sensitive personal data? If so, is there a clause prohibiting onward transfer to covered persons or countries of concern? If not, you’re potentially out of compliance. You may need to renegotiate or terminate contracts that create risks you can’t control. Relying on “we didn’t know” is insufficient, as the DSP holds U.S. persons accountable for failing to implement reasonable and proportionate due diligence.

Also, consider implementing a DSP-specific screening protocol that goes beyond sanctions and AML lists and includes the DOJ’s Covered Persons List. Integrate this into your vendor onboarding, renewal, and periodic review processes. Remember, under the DSP, even inadvertent exposure can constitute a violation. That means it’s no longer enough to run a vendor through OFAC and call it a day. You need a national security screening lens. Compliance must lead this effort, not procurement, legal, or IT. If a vendor relationship enables DSP-prohibited access, the legal liability will land squarely on your doorstep.

3. Draft contractual clauses that prohibit data resale or access by covered entities.

The DSP has thrown a wrench into how we think about contract drafting. Referencing generic data use terms or standard confidentiality clauses is no longer sufficient. You’re exposed if your contracts do not explicitly prohibit the onward sale or transfer of covered data to countries of concern or covered persons. Under the DSP, exposure is not simply reputational but both civil and criminal.

Compliance teams should immediately collaborate with legal and procurement to update all relevant agreements. That includes data-sharing contracts, licensing, cloud service agreements, vendor onboarding templates, and M&A data room protocols. Insert clauses prohibiting foreign counterparties from transferring sensitive personal or government-related data to any covered person or country of concern. Go further: mandate that they notify you of any suspected breach and certify compliance annually.

Do not stop at language insertion. Require enforceability mechanisms, termination clauses, indemnification provisions, and audit rights. The DOJ clarified that including boilerplate language will not shield you from enforcement. You may have committed a prohibited transaction if you knew or should have known that a foreign vendor resold data to a hostile actor. Even the best legalese won’t save you without operational controls to back it up.

Consider maintaining a DSP Clause Library, a set of pre-approved terms for use across contracts by legal and compliance staff. Train your contract managers on red flags. Build escalation protocols when counterparties push back. And do not forget to update your templates as the DOJ issues more guidance. In short, think of DSP compliance clauses the way you would anti-corruption reps and warranties in an FCPA context: a first line of defense, but only effective when part of a broader compliance architecture.

The Department of Justice’s new Data Security Program, effective October 6, 2025, is a game-changer for corporate compliance. It redefines data governance as a national security obligation, requiring companies to align privacy policies with DSP risk categories and scrutinize third-party vendors for ties to covered persons or countries of concern. Compliance professionals must proactively draft enforceable contracts, build auditable training and reporting systems, and educate C-suites and boards that DSP is not “just privacy”; rather, it is national security compliance. With the clock ticking, the time to act is now. Join us tomorrow for Part 2, where we continue the roadmap to DSP readiness.

Categories
Blog

Data Defense is the New Compliance: What the Data Security Program Means for Compliance

In an age where data is the new oil, the Department of Justice (DOJ) has dropped a regulatory hammer with the release of the Data Security Program (DSP), which was released on April 8, 2025, and was implemented under Executive Order 14117. If you are a corporate compliance officer, this is not simply another acronym to file away; it is a full-blown mandate to build a risk-based compliance infrastructure that treats data the way we’ve historically treated cash: something precious, something dangerous, and something that foreign adversaries are actively trying to exploit. The DSP marks a critical shift in how compliance professionals think about national security, not as the purview of spooks and diplomats but as a living, breathing component of your organization’s third-party risk, data governance, and vendor oversight programs. Equally interestingly, the Trump Administration builds with zero fanfare on the building blocks put in place by the Biden Administration.

DSP Is More Than an IT Issue

The DOJ is not simply aiming at you, your Chief Information Officer (CIO), but rather looking squarely at you, the compliance professional. The new rules require U.S. persons (which includes individuals and corporations) to proactively monitor, restrict, and, when necessary, report data transactions that could expose U.S. Government-related or bulk sensitive personal data to adversarial foreign actors. These rules are about compliance and accountability. DSP enforcement brings with it the full force of the International Emergency Economic Powers Act (IEEPA), meaning penalties can include civil fines exceeding $368,000 per violation and criminal liability with up to 20 years in prison. That should sober up even the most compliance-fatigued executive.

Who’s in the DOJ’s Crosshairs?

The program identifies “Countries of Concern,” including China, Russia, Iran, North Korea, Venezuela, and Cuba. It further defines “covered persons” as not just foreign governments or entities but any individual or company operating under their influence, including contractors and subsidiaries that may be 50% or more owned by such parties. This is not simply a red flag but should be seen as a red carpet for compliance departments to step up and create data-focused due diligence protocols that mirror those already established under FCPA for anti-bribery or OFAC for sanctions screening.

The DSP targets four main types of transactions:

1. Data Brokerage Agreements

2. Vendor Agreements

3. Employment Agreements

4. Investment Agreements

Any of these, involving sensitive personal data or government-related data, could trigger a compliance obligation or, worse, a violation. Even anonymized or encrypted data isn’t exempt if it can be aggregated to reveal individual identities. Compliance teams must now incorporate data risk classification and flow mapping into their routine controls and audits.

Restricted and Prohibited Transactions: Not Just Semantics

The DSP distinguishes between “prohibited” and “restricted” transactions. Prohibited transactions, like selling bulk data to a covered person or foreign entity, are off-limits. Restricted transactions, such as engaging a foreign vendor for cloud services, are allowed only if specific due diligence, security protocols, and contractual safeguards are met.

Translation for compliance officers: This is your new playbook. You must tailor contract language to prohibit onward data transfers, track compliance, audit vendors, and report violations within 14 days. Inaction isn’t just a missed best practice; it could also be a statutory violation.

Your New Compliance Infrastructure: Four Pillars

Under Subpart J of the DSP, companies must develop and maintain a robust Data Compliance Program. Here’s what the DOJ expects from you:

1. Risk-Based Due Diligence Procedures: Know your data, vendors, employees, and business model. Map where sensitive data lives and flows. Identify exposure to covered persons or countries of concern.

2. Security Requirements: Implement the Cybersecurity and Infrastructure Security Agency’s (CISA) security standards and document them in a written policy reviewed annually.

3. Audit Program: Conduct an annual independent audit to assess DSP compliance, covering your vendors, data flows, contracts, and internal controls.

4. Training and Certification: Deliver targeted training to frontline staff and compliance officers. Certify the program annually with a sign-off from a senior officer not designated as a covered person.

The Compliance Response

Do not underestimate the power of line managers in operationalizing this program. From procurement officers vetting vendors to HR leads onboarding new hires, your middle managers are now your eyes and ears for potential data risks. Equip them with training, toolkits, and escalation protocols. Empower them to say, “No, we can’t do that,” and back them up when they do. This is where culture meets controls, and a compliance-minded organization distinguishes itself from a liability waiting to happen. DSP violations are serious business, but the program leaves room for good-faith actors. Reporting suspected breaches or rejected transactions within 14 days may mitigate enforcement risks.

What to Do Now: A Compliance  Checklist

For those who want to get ahead of this before the hammer drops, here’s your compliance punch list:

  • Review your current data governance and privacy policies—align them with DSP risk categories.
  • Audit your third-party vendor agreements for exposure to covered persons or countries of concern.
  • Draft contractual clauses that explicitly prohibit data resale or access by covered entities.
  • Set up internal processes for training, audit, and reporting.
  • Engage your board and C-suite on DSP requirements. This is national security compliance, not just privacy.
  • Start building your Data Compliance Program today, as the date of October 6, 2025 (the full implementation date) is not as far off as it seems.

Conclusion: The Age of Data National Security is Here

The DSP marks a sea change for compliance professionals. It transforms data governance from an IT-driven policy concern into a top-tier compliance risk, with reporting deadlines, audit mandates, and hefty penalties. It requires us to think beyond cybersecurity and embrace data risk as a function of geopolitical conflict and corporate accountability. Compliance is not simply about following the rules; rather, it is about being the first line of defense in protecting American data, values, and institutions from adversarial exploitation. And in that mission, every compliance professional is now a stakeholder in national security.

So, as Bette Davis might say, buckle up, tune up your compliance programs, and get ready to evangelize the next great frontier in corporate compliance.

Categories
Innovation in Compliance

Innovation in Compliance – Innovating Data Security a Conversation with Christian Geyer

Innovation comes in many forms, and compliance professionals need to be ready for it and embrace it. Join Tom Fox, the Voice of Compliance, as he visits with top innovative minds, thinkers, and creators in the award-winning Innovation in Compliance podcast. In this episode, host Tom Fox is joined by Christian Geyer, CEO of Actfore, the podcast’s sponsor.

Christian discusses his journey from initially supporting the Navy and Marine Corps to founding Actfore, a company focused on automating breach notifications using onshore software powered by patent-pending AI technologies. The conversation delves into how Actfore simplifies breach notifications and the impact of AI and machine learning in improving speed, precision, and data security in incident responses. Christian also speaks on the importance of unified risk management, future data governance trends, and the regulatory requirements for data transfers between the US and EU. This episode offers valuable insights into leveraging data mining to enhance compliance and cybersecurity measures.

Key highlights:

  • Automation and Innovation in Data Breach Response
  • AI and Machine Learning in Data Mining
  • Compliance and Data Governance
  • Reverse Domino Effect in Incident Response
  • Future of Data Mining and Risk Management

Resources

Christian Geyer on LinkedIn

Actfore

Tom Fox

Instagram

Facebook

YouTube

Twitter

LinkedIn

Categories
Uncovering Hidden Risks

Ep 6 – Three Steps to Build a Comprehensive Data Security Strategy

Raman Kalyan, Director of Product Marketing, Microsoft and former podcast host, joins Erica Toelle and guest host Liz Willets on this week’s episode of Uncovering Hidden Risks. Raman’s team leads product marketing initiatives to increase broad enterprise adoption and awareness of Microsoft 365 Risk Management and Investigation solution categories while partnering closely with leaders across engineering, planning, and strategy teams to determine and recommend critical product/service investments. Raman discusses why a comprehensive data security approach is an essential consideration for companies, how to implement an effective data security strategy, and what he sees as the future of the data security space.

In This Episode, You Will Learn:

  • What it means to have a comprehensive data security approach
  • How you can leverage insights from risky insider activities
  • Why comprehensive data security should matter

Some Questions We Ask:

  • What does an end-to-end data protection strategy look like?
  • How do you balance data security without hindering employee productivity?
  • When should teams get started on their data security strategy?

Resources:

View Raman Kalyan on LinkedIn

View Liz Willets on LinkedIn

View Erica Toelle on LinkedIn

Connect with the Compliance Podcast Network at:

LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/

Categories
Uncovering Hidden Risks

Ep 7 – Cloud Native Data Loss Prevention: The Future of Data Security

Maithili Dandige, Partner Group Product Manager at Microsoft, joins Erica Toelle and guest host Shilpa Bothra on this week’s episode of Uncovering Hidden Risks. Maithili’s team is behind Microsoft Purview products such as Information Protection, Data Loss Prevention, Data Lifecycle Management, Records Management, eDiscovery, and Audit. Maithili discusses Data Loss Prevention, some recent DLP research, and what’s upcoming in this space.

In This Episode You Will Learn:

  • The journey of DLP solutions and where the market is today
  • What customers should be expecting from DLP solution providers
  • The benefits of adopting a cloud-native solution

Some Questions We Ask:

  • What do you see as the future of DLP space?
  • How can you empower your users to make the right data-handling decisions?
  • What trends do you currently see evolving?

Resources:

View Maithili Dandige on LinkedIn

View Shilpa Bothra on LinkedIn

View Erica Toelle on LinkedIn

Connect with the Compliance Podcast Network at:

LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/

Categories
Uncovering Hidden Risks

Ep 13 – Unveil Data Security Paradoxes

Herain Oberoi, General Manager of Data Security, Privacy, and Compliance for Microsoft, joins Erica Toelle and guest host Tina Ying, Senior Product Marketing Manager at Microsoft, on this week’s episode of Uncovering Hidden Risks. Microsoft has recently released a new report called the Data Security Index. Erica, Tina, and Herain explain what drove the team to complete this research, release the report, and share valuable insights that can empower organizations to optimize their data security programs.

In This Episode You Will Learn:

  • Why do more tools bring less security, but organizations still adopt them?
  • When organizations should allocate resources to optimize data security
  • How security leaders can lead their teams with the goal of enhancing all-up security posture

Some Questions We Ask:

  • How can organizations enhance their data security posture?
  • Should organizations purchase best-of-suite or best-of-breed solutions?
  • What advice do you give organizations facing the challenge of using isolated solutions?

Resources:

View Herain Oberoi on LinkedIn

View Tina Ying on LinkedIn

View Erica Toelle on LinkedIn

Related Microsoft Podcasts:

Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Connect with the Compliance Podcast Network at:

LinkedIn: https://www.linkedin.com/company/compliance-podcast-network/
Facebook: https://www.facebook.com/compliancepodcastnetwork/
YouTube: https://www.youtube.com/@CompliancePodcastNetwork
Twitter: https://twitter.com/tfoxlaw
Instagram: https://www.instagram.com/voiceofcompliance/
Website: https://compliancepodcastnetwork.net/

Categories
Data Driven Compliance

Data Driven Compliance: eCom Surveillance and Cybersecurity Data Management

Are you struggling to keep up with the ever-changing compliance programs in your business? Look no further than the award-winning Data Driven Compliance podcast, hosted by Tom Fox, which is a podcast featuring an in-depth conversation around the uses of data and data analytics in compliance programs. Data Driven Compliance is back with another exciting episode The intersection of law, compliance, and data is becoming increasingly important in the world of cross-border transactions and mergers and acquisitions.

Data has become much more ubiquitous and needs to be incorporated into business processes. AI data cleansing helps to reduce false positives and provides context to alerts generated by the system. AI capabilities are divided into three categories: removing duplicative content, detecting risk, and providing context. AI-powered data cleansing strips out non-human generated content and focuses on what was sent by an individual. This helps to lower false positives in alerts generated by the system.

The need for eCom surveillance is increasing as communication sources become more varied. Slack, Zoom, Teams, Bloomberg chat, and Ice chat are all becoming commonplace, and companies need to be able to capture data from these sources. Artificial intelligence and machine learning models are being deployed to empower a compliance officer to focus on what’s important and be risk-based. Companies that have been hesitant about the cloud are now moving their data to the cloud.

The amount of voice business that is happening over Zoom and teams and other voice channels has skyrocketed. Regulators have been very clear that you need to capture and record that voice data. Customers have asked for more and more data sources to capture, including audio. Compliance teams need systems to manage collaboration, case management tools, and review tools. Technology allows compliance teams to no longer use Excel or SharePoint to manage their own internal processes.

The combination of technology and compliance is transforming the industry. Artificial intelligence capabilities have come a long way in the past few years and are already good enough to provide a lot of value to customers. The innovation over the next few years will be on the defensibility front, proving defensibly why something was alerted on and why something else was not. Technology is available to capture every data source that’s out there, and it is essential for compliance teams to leverage this technology to remain compliant and competitive.

 Key Highlights

·      Ecom Surveillance

·      Cybersecurity Data Management

·      AI and Compliance

Resources:

 Tom Fox 

Connect with me on the following sites:

Instagram

Facebook

YouTube

Twitter

LinkedIn